CHAPTER 1 : Introduction to Network Security

CHAPTER 1 : Introduction to Network Security

University

10 Qs

quiz-placeholder

Similar activities

Re-Quiz : Developing Your Security Policy (Chapter 2)

Re-Quiz : Developing Your Security Policy (Chapter 2)

University

11 Qs

CNET151 - Chapt 15 -Cybersecurity Engineering

CNET151 - Chapt 15 -Cybersecurity Engineering

University

15 Qs

Incident Response - Quiz 1

Incident Response - Quiz 1

University

10 Qs

Safeguarding Your Data Online Quiz

Safeguarding Your Data Online Quiz

12th Grade - University

11 Qs

Chapter 4

Chapter 4

University

10 Qs

Cybersecurity

Cybersecurity

University

12 Qs

CN3303 - Lecture 9: Cloud Security threats

CN3303 - Lecture 9: Cloud Security threats

University

10 Qs

Chapter 1: Introduction to Cyber Security

Chapter 1: Introduction to Cyber Security

University

15 Qs

CHAPTER 1 : Introduction to Network Security

CHAPTER 1 : Introduction to Network Security

Assessment

Quiz

Computers

University

Hard

Created by

farizatul akmar

Used 12+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Which of the following are the THREE (3) importance of computer and network security?

To protect company assets

To keep your accessibility

To gain a competitive advantage

To keep you job

2.

FILL IN THE BLANK QUESTION

1 min • 3 pts

The three legs of the "security trinity" are:

1. ________

2. ________

3. ________

3.

MULTIPLE SELECT QUESTION

45 sec • 4 pts

What are the FOUR (4) core principles of Information Security?

Integrity

Prevention

Confidentiality

Availability

Authentication

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The following are the risks assessment process of evaluating potential risks EXCEPT ...

Identifying and prioritizing assets

Identifying threats and their probabilities

Developing a cost benefit analysis

Identifying accessibility

Identifying countermeasure

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

____________ is an effort to obtain illegal admission to your organization’s network, to take your data without your knowledge, or execute other malicious pursuits

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________ refers to malicious hackers gain unauthorized access to a computer system or network. They also make amendments to the data, either by encrypting, removing, or compromising it.

7.

MULTIPLE SELECT QUESTION

45 sec • 4 pts

What are the FOUR (4) major categories of Network Security Threats?

Structured Threats

Cumulative Threats

Externals Threats

Internal Threats

Unstructured Threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?